🚨 New Cybersecurity Advisory: #StopRansomware: Black Basta 🚨 I highly recommend checking out the latest Cybersecurity Advisory, which was co-authored by CISA, the FBI, HHS, and MS-ISAC. This detailed report on the Black Basta ransomware variant provides critical insights for network defenders. Over the last two years, the Black Basta Ransomware-as-a-Service (RaaS) operation has targeted over 500 private industry and critical infrastructure entities in North America, Europe, and Australia. Here are some key takeaways: 🔹 Proactive Measures: Implement phishing-resistant multi-factor authentication (MFA) and ensure your systems are updated with the latest patches to mitigate vulnerabilities. 🔹 Awareness Training: Regularly train users to recognize and report phishing attempts. User vigilance is crucial in preventing initial access by threat actors. 🔹 Advanced Threat Detection: Utilize continuous monitoring and leverage threat intelligence to swiftly detect and respond to potential compromises. 🔹 Lateral Movement Tools: Be aware that Black Basta affiliates use tools like BITSAdmin and Cobalt Strike for lateral movement. Ensure proper network segmentation and Implement controls to detect and block these tools. 🔹 Backup and Recovery: Maintain regular backups of critical systems and configurations to ensure quick recovery in the event of an attack. Stay informed and prepared to defend against ransomware threats. Build a Zero Trust Architecture to protect systems against such attacks. Read the full advisory for more detailed recommendations and action steps at CISA's website: https://lnkd.in/eGbsGksM #cybersecurity #Ransomware #ZeroTrust #networksecurity #technology
Essential Steps for Ransomware Protection
Explore top LinkedIn content from expert professionals.
-
-
🚨 Seattle Airport Shutdown: Could Your Business Survive a Cyber Attack? Just spoke on Newsmax Media, Inc. about the recent Seattle-Tacoma Airport outage that caused a massive disruption in U.S. infrastructure. This isn’t just about delayed flights—cybercriminals managed to cripple one of the most important transportation hubs in America, holding it hostage through what appears to be a ransomware attack. When we FAIL to prioritize cybersecurity before incidents happen, we end up in a reactive state, forced to make tough choices like paying a ransom. I just heard from a company that faced a $900,000 extortion attempt, and their offsite backups weren’t even functioning. They were in a crisis—don’t let this be you! 🔐 Here are 5 CyberSecure Mindset Tips to Prevent Ransomware Attacks: 👉 Backup Regularly and Test Your Backups: While backing up your data is essential, it won't prevent a ransomware attack from occurring. Remember, backups are your last line of defense after the attack hits. Make sure your backups are encrypted, stored offsite, and regularly tested for functionality. 👉 Multi-Factor Authentication (MFA) is Key: Adding an extra layer of security through MFA can stop cybercriminals from easily accessing your systems. Even if they have your password, MFA can block unauthorized access. 👉 Train Your Employees to Spot Phishing: Cybercriminals often use phishing emails as their entry point. Regular employee training is critical for identifying suspicious emails, links, and attachments, which could otherwise compromise your entire network. 👉 Keep Your Software Up to Date: Outdated software is a welcome mat for cybercriminals. Regularly update and patch your systems to close security loopholes that ransomware attacks often exploit. 👉 Have an Incident Response Plan Ready: Preparation is key. Develop a clear, actionable response plan that outlines steps to take if you become a ransomware victim. Ensure everyone knows who to contact and how to proceed. ⚠️ Important Reminder: If you’re hit with a ransomware attack, it’s not just a disruption—cybercriminals have already breached your systems and stolen your data. In reality, this is more than just ransomware—it’s a data breach. I always try to provide five tips to stay safe and I know there are more, what do you recommend companies should do to avoid becoming the next cybercrime victim. Stay proactive, not reactive. Follow me for more insights on how to develop a CyberSecure Mindset and protect your family and business from cyber threats! #CyberSecureMindset #CybersecurityAwareness #RansomwareProtection #DataBreach #CyberThreats #PhishingPrevention #MFA #BackupAndRestore #EmployeeTraining #CyberResilience #CyberDefense #DataProtection #IncidentResponse #DigitalSecurity #OnlineSafety
-
I think 90% of companies couldn't pull their own plug. Here are some ideas... ICYMI, Co-op avoided a more severe cyber attack by disconnecting its own network and choosing a self-imposed short-term disruption to prevent a longer-term one caused by criminals. We've all read stories about that "critical moment at 2 AM" when some security leader has to make the call to take the entire company offline to apply a digital tourniquet. But how many companies could "pull the plug" even if they wanted to? The interconnected "plugs" are all virtual in today's IT landscape. And what else do you need to do quickly when faced with impending cyber doom? Here are some quick tips to ponder: 1⃣ Practice "pulling the plug" as a part of your BCDR preparedness. • What is the business disruption impact? • How do you notify users? • Can you still log in? • How are customers affected? • What middleware comms will function? • Do you need out-of-band comms? 2⃣ Consider using access control instead of a full disconnect. • Can you block all egress or ingress with a few firewall or router rules? • What about SaaS and cloud? • Could you push some ready-to-go emergency endpoint hardening rules instantly (assume your endpoint management/orchestration platform is not compromised, and if it was, you could switch to a backup method, such as using EDR command & control). 3⃣ Think about identity - lots of ways to slow an attacker or prevent new login sessions using identity controls. • Would blocking all user logins except a few designated, safe logins all for a more limited disconnect? • Maybe you only need to block egress, or some egress. • Maybe you only need to block RDP and NetBIOS internally. • Do you have a trusted business-critical allowlist that could have precedence above an all-block rule? • If yes, is the allowlist translated into discrete source/destination/protocol access policies that could be deployed quickly? 4⃣ Can you reset all privileged credentials quickly? • Most companies do this manually, but you need to be able to do it with push-button automation. • What if access was obtained via API keys? Can you reset API keys quickly? • What about currently active sessions? • What about SaaS and cloud? "Pulling the plug" is a lot more complicated than most realize until you start planning and practicing for scenarios that may require it. My message to all is not only to practice pulling the plug, but to define the different scenarios and degrees of emergency access changes to deploy so you can be more surgical and limit business impact. This list is just the tip of the iceberg. What am I missing?
-
🚨 Ransomware 2.0: The Stakes Have Never Been Higher 🚨 As cybercriminals enhance their tactics, we’re not just combating data encryption anymore. Welcome to the era of #Ransomware2.0—a more sophisticated, damaging, and insidious threat. Here's the new reality: - Data Extortion: It’s not just about locking your files; it involves stealing sensitive data and threatening public leaks. - Double Extortion: Expect ransom demands both to decrypt your data and to prevent its leak. - Disruption: Prepare for #DDoS attacks aimed at crippling your operations. - Supply Chain Attacks: Attackers target vendors to infiltrate entire networks, amplifying the threat. So, what can your organization do to fortify its defenses? - Innovative Backup Strategies: Traditional backups aren’t enough. Ensure your backups are air-gapped—isolated from the production environment to prevent access by threat actors. Additionally, maintaining an immutable copy of backups ensures they cannot be altered or deleted under any circumstance. - Patch & Segment: Regularly update systems and isolate critical assets to limit damage scope. - Education is Key: Train employees on the latest cybersecurity practices, including how to identify phishing attempts. - Incident Preparedness: Have a rehearsed incident response plan to minimize downtime and impact. The cybersecurity landscape is evolving rapidly. Stay vigilant and proactive to protect your business. #cybersecurity #infosec #ransomware #datasecurity
Explore categories
- Hospitality & Tourism
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Negotiation
- Communication
- Engineering
- Career
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development